Everything you need to know about ATM attacks and fraud: part 2

In part two of this two-part series on ATM attacks and fraud, we outline the final two ATM attack types—logical and social engineering—and provide info on how they are conducted, the different malware families used in these attacks, and how to protect against them.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: part 2 appeared first on Malwarebytes Labs.

Everything you need to know about ATM attacks and fraud: Part 1

If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: Part 1 appeared first on Malwarebytes Labs.

Knowing when it’s worth the risk: riskware explained

Riskware is a type of software that, while considered legitimate, can still put users at risk in some way. Learn why anti-malware vendors detect it, and how to tell whether the apps you use are riskware or not.

Categories:

Tags:

(Read more…)

The post Knowing when it’s worth the risk: riskware explained appeared first on Malwarebytes Labs.

4 Lessons to be learned from the DOE’s DDoS attack

The Department of Energy was subject to a DDoS attack that caused major disruptions in their operations. Is the smart grid ready for such an attack? Here are the lessons we can take away from the event.

Categories:

Tags:

(Read more…)

The post 4 Lessons to be learned from the DOE’s DDoS attack appeared first on Malwarebytes Labs.

Of hoodies and headphones: a spotlight on risks surrounding audio output devices

For years, researchers have been poking holes in our audio output devices in the name of security and privacy. They’ve found many ways our headphones can be hacked or otherwise compromised. Learn what they discovered, and how you can secure your own.

Categories:

Tags:

(Read more…)

The post Of hoodies and headphones: a spotlight on risks surrounding audio output devices appeared first on Malwarebytes Labs.

Explained: like-farming

Like-farming is a popular method on social media to harvest as many likes and shares as possible in order to increase the value of a site or domain. But what happens when scammers get in the game?

Categories:

Tags:

(Read more…)

The post Explained: like-farming appeared first on Malwarebytes Labs.

Malware targeting industrial plants: a threat to physical security

When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here’s how to protect your workforce and your business from targeted threats.

Categories:

Tags:

(Read more…)

The post Malware targeting industrial plants: a threat to physical security appeared first on Malwarebytes Labs.

Who is managing the security of medical management apps?

Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That’s why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible?

Categories:

Tags:

(Read more…)

The post Who is managing the security of medical management apps? appeared first on Malwarebytes Labs.

New research finds hospitals are easy targets for phishing attacks

New research from Brigham and Women’s Hospital in Boston finds hospital employees are extremely vulnerable to phishing attacks. The study highlights just how effective phishing remains as a tactic, and why awareness of email scams is more critical than ever.

Categories:

Tags:

(Read more…)

The post New research finds hospitals are easy targets for phishing attacks appeared first on Malwarebytes Labs.